File: airtun-ng.8.in

package info (click to toggle)
aircrack-ng 1%3A1.6%2Bgit20210130.91820bc-1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 19,056 kB
  • sloc: ansic: 67,045; cs: 5,392; sh: 3,773; python: 2,565; pascal: 1,074; asm: 570; makefile: 253; cpp: 46
file content (109 lines) | stat: -rw-r--r-- 2,471 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
.TH AIRTUN-NG 8 "@MAN_RELEASE_DATE@" "@MAN_RELEASE_VERSION@"

.SH NAME
airtun-ng - a virtual tunnel interface creator for aircrack-ng
.SH SYNOPSIS
.B airtun-ng
[options] <interface name>
.SH DESCRIPTION
.BI airtun-ng
creates a virtual tunnel interface (atX) for sending arbitrary IP packets by using raw ieee802.11 packet injection.
.SH OPTIONS
.PP
.TP
.I -H, --help
Shows the help screen.
.TP
.I -x <pps>
Sets maximum number of packets per second.
.TP
.I -a <BSSID>
Specifies the BSSID for the iee802.11 header. In WDS Mode this sets the Receiver.
.TP
.I -h <SMAC>
Specifies the source MAC for the iee802.11 header.
.TP
.I -i <iface>
Sets the capture interface.
.TP
.I -r <file>
Specifies a file to read 802.11 frames.
.TP
.I -y <PRGA-file>
Is the name of the file, which provides the keystream for WEP encoding. (No receiving, just transmitting of IP packets.)
.TP
.I -w <WEP-key>
This is the WEP key to en-/decrypt all traffic going through the tunnel.
.TP
.I -e <ESSID>
Sets the target network SSID (use with -p).
.TP
.I -p <passphrase>
Use this WPA passphrase to decrypt packets (use with -a and -e).
.TP
.I -t <tods>
Defines the ToDS and FromDS bit in the ieee802.11 header. For tods=1, the ToDS bit is set to 1 and FromDS to 0, while tods=0 sets them the other way around. If set to 2, it will be tunneled in a WDS/bridge.
.TP
.I -m <netmask>, --netmask <netmask>
Filters networks based on bssid ^ netmask combination. Needs \-d, used in replay mode. 
.TP
.I -d <BSSID>, --bssid <BSSID>
Filters networks based on the <BSSID>. Used in replay mode.
.TP
.I -f, --repeat
Enables replay mode. All read frames, filtered by bssid and netmask (if specified), will be replayed.
.TP
.I -s <transmitter>
Set Transmitter MAC address for WDS Mode.
.TP
.I -b
Bidirectional mode. This enables communication in Transmitter\(aqs AND Receiver\(aqs networks. Works only if you can see both stations.
.SH EXAMPLES
.B airtun-ng
\-a 00:14:22:56:F3:4E \-t 0 \-y keystream.xor wlan0
.PP
.SH SEE ALSO
.br
.B airbase-ng(8)
.br
.B aireplay-ng(8)
.br
.B airmon-ng(8)
.br
.B airodump-ng(8)
.br
.B airodump-ng-oui-update(8)
.br
.B airserv-ng(8)
.br
.B besside-ng(8)
.br
.B easside-ng(8)
.br
.B tkiptun-ng(8)
.br
.B wesside-ng(8)
.br
.B aircrack-ng(1)
.br
.B airdecap-ng(1)
.br
.B airdecloak-ng(1)
.br
.B airolib-ng(1)
.br
.B besside-ng-crawler(1)
.br
.B buddy-ng(1)
.br
.B ivstools(1)
.br
.B kstats(1)
.br
.B makeivs-ng(1)
.br
.B packetforge-ng(1)
.br
.B wpaclean(1)
.br
.B airventriloquist(8)